Compliance Management Definitions

This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing compliance strategy and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.

  • R

    risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A risk map helps companies identify and prioritize the risks associated with their business.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces. 

  • S

    Secure File Transfer Protocol (SSH File Transfer Protocol)

    SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems.

  • Securities and Exchange Act of 1934 (Exchange Act)

    The Securities and Exchange Act of 1934 (Exchange Act) is a law that governs secondary trading and stock exchanges.

  • Senate Judiciary Committee (SJC)

    The U.S. Senate Judiciary Committee is in charge of conducting hearings prior to Senate votes on confirmation of federal judges and has broad jurisdiction over federal criminal law.

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions.

  • social media policy

    A social media policy (also called a social networking policy)  is a corporate code of conduct that provides guidelines for employees who post content on the Internet either as part of their job or as a private person.

  • speculative risk

    Speculative risk is a category of risk that can be taken on voluntarily and will either result in a profit or loss. 

  • systemic risk

    Systemic risk is a category of risk that describes threats to a system, market or economic segment.

  • T

    total risk

    Total risk is an assessment that identifies all of the risk factors, including potential internal and external threats and liabilities, associated with pursuing a specific plan or project or buying or selling an investment.

  • U

    U.S. Department of Homeland Security (DHS)

    The U.S. Department of Homeland Security (DHS) is a federal agency designed to protect the United States against threats.

  • unknowable risk

    An unknowable risk is a potential threat to an organization's processes that is not known and cannot be quantified or controlled.

  • unsystemic risk (unsystematic risk)

    Unsystemic risk (also known as unsystematic risk) is a type of investment risk that is specific to an industry or organization.

  • V

    VAL IT (value from IT investments)

    VAL IT (value from IT investments) is a framework that outlines governance best practices for information technology-enabled business investments.

  • Video Privacy Protection Act of 1988

    The Video Privacy Protection Act of 1988 is United States legislation that prevents wrongful disclosure of an individual's personally identifiable information stemming from their rental or purchase of audiovisual material, including videotapes, DVDs and video games.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close